Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upImplement new firewall dom0->VM interface #1815
Comments
marmarek
added
enhancement
C: core
P: major
release-notes
labels
Mar 6, 2016
marmarek
added this to the Release 4.0 milestone
Mar 6, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Mar 7, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Mar 7, 2016
added a commit
to woju/qubes-core-admin
that referenced
this issue
Mar 11, 2016
added a commit
to woju/qubes-core-admin
that referenced
this issue
Mar 11, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
added a commit
to woju/qubes-core-admin
that referenced
this issue
Mar 21, 2016
added a commit
to woju/qubes-core-admin
that referenced
this issue
Mar 21, 2016
andrewdavidwong
referenced this issue
May 19, 2016
Closed
warn the user if qubes-firewall settings are ignored #2003
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
May 19, 2016
Member
Questions pertaining to using Whonix with firewall rules keep coming up, so I'm providing a response here so that I can direct people to this issue:
Whonix-Gateway does not currently support firewall rules. This is a known issue, which I brought up here and here, which branched off here and is being tracked in #1815 (this issue) and here.
Short answer: For now, there's no way to enforce firewall rules for a VM using a whonix-gw as its NetVM, but a solution is in the works.
|
Questions pertaining to using Whonix with firewall rules keep coming up, so I'm providing a response here so that I can direct people to this issue: Whonix-Gateway does not currently support firewall rules. This is a known issue, which I brought up here and here, which branched off here and is being tracked in #1815 (this issue) and here. Short answer: For now, there's no way to enforce firewall rules for a VM using a |
added a commit
that referenced
this issue
May 31, 2016
added a commit
to QubesOS/qubes-doc
that referenced
this issue
Sep 6, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Sep 6, 2016
Member
I've documented new (yet to be implemented) interface for firewall rules:
https://www.qubes-os.org/doc/vm-interface/
As for implementation (in the VM), I plan to replace current iptables-based qubes-firewall script, with nftables one. Thanks to independent tables it will allow to avoid interference between different firewall tools. For example it will allow to respect those rules by Whonix Gateway, without breaking Whonix firewall.
This is somehow extended idea of #974
/cc @adrelanos
|
I've documented new (yet to be implemented) interface for firewall rules: As for implementation (in the VM), I plan to replace current iptables-based |
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 8, 2016
added a commit
to marmarek/old-qubes-core-agent-linux
that referenced
this issue
Sep 12, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 12, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 12, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 12, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 12, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 12, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 12, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 19, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 19, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 19, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 19, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 19, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 19, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 19, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 19, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 19, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 19, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 21, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 21, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 21, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 21, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 21, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 21, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Sep 21, 2016
woju
closed this
in
woju/qubes-core-admin@d4f29bb
Oct 4, 2016
marmarek
referenced this issue
Oct 5, 2016
Closed
Qubes Firewall - Add rules to QBS-prefixed chain #974
marmarek
referenced this issue
Nov 28, 2016
Open
Firewall rule 'Allow DNS queries' does not take into account custom (VPN) DNS server #1183
rustybird
referenced this issue
Apr 26, 2017
Closed
Firewall rules do not apply to sys-whonix traffic? #2774
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
ubestemt
Apr 27, 2017
Shouldn't a warning be displayed when using sys-whonix as NetVM and opening the Firewall tab in VM Preferences, just like it is when sys-net is used as NetVM? Otherwise, how will the average user know?
ubestemt
commented
Apr 27, 2017
|
Shouldn't a warning be displayed when using sys-whonix as NetVM and opening the Firewall tab in VM Preferences, just like it is when sys-net is used as NetVM? Otherwise, how will the average user know? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Apr 27, 2017
Member
Shouldn't a warning be displayed when using sys-whonix as NetVM and opening the Firewall tab in VM Preferences, just like it is when sys-net is used as NetVM? Otherwise, how will the average user know?
Sounds like this is covered by #2003.
Sounds like this is covered by #2003. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jun 9, 2017
Automated announcement from builder-github
The package python2-dnf-plugins-qubes-hooks-4.0.0-1.fc24 has been pushed to the r4.0 testing repository for the Fedora fc24 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Jun 9, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-fc24-cur-test
label
Jun 9, 2017
qubesos-bot
referenced this issue
in QubesOS/updates-status
Jun 9, 2017
Closed
core-agent-linux v4.0.0 (r4.0) #68
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jun 9, 2017
Automated announcement from builder-github
The package python2-dnf-plugins-qubes-hooks-4.0.0-1.fc25 has been pushed to the r4.0 testing repository for the Fedora fc25 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Jun 9, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-fc25-cur-test
label
Jun 9, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jun 9, 2017
Automated announcement from builder-github
The package qubes-core-agent_4.0.0-1+deb8u1 has been pushed to the r4.0 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Jun 9, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-jessie-cur-test
label
Jun 9, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jun 9, 2017
Automated announcement from builder-github
The package qubes-core-agent_4.0.0-1+deb9u1 has been pushed to the r4.0 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Jun 9, 2017
|
Automated announcement from builder-github The package
|
marmarek commentedMar 6, 2016
This is placeholder for the outcome of this discussion: https://groups.google.com/d/msgid/qubes-devel/20160114163808.GW4892%40mail-itl